Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Google Fixes Actively Exploited Chrome Vulnerability

Google has recently released an urgent security update to fix a high-severity vulnerability in its Chrome browser. This flaw, identified as CVE-2024-7971, has been actively exploited by attackers, posing a significant risk to users. The vulnerability, rooted in the V8 JavaScript and WebAssembly engine, could allow remote attackers to execute harmful code via specially crafted web pages. As cyber threats continue to evolve, it is crucial for users to stay informed and ensure their browsers are up to date.

Advanced Android Malware Targets NFC Data for ATM Cashouts

A new strain of Android malware has emerged, targeting victims' card details and utilizing near-field communication (NFC) technology to facilitate unauthorized ATM withdrawals. This sophisticated crimeware, active since March 2024, has already impacted customers of three major Czech banks.

Cloud Security And Privacy: Best Practices To Mitigate The Risks

Cloud security refers to technologies, best practices, and safety guidelines that help to protect your data from human errors, insider and security threats. Therefore, it naturally covers a wide range of procedures, which are aimed at securing systems from data breaches, data loss, unauthorized access, and other cybersecurity-related risks that are growing from year to year.

Top 10 Cyber Risk Assessment Tools

Estimating the potential impact of a successful cyber attack may seem impossible, especially given the rapid expansion of organizations’ digital footprint (and, consequently, their attack surface). One example are attacks which pertain to the contact points between businesses and clients, such as websites and mobile apps. In particular, these assets can be cloned and used for phishing attacks.

Response Accuracy Retention Index (RARI) - Evaluating Impact of Data Masking on LLM Response

As language models (LLMs) in enterprise applications continue to grow, ensuring data privacy while maintaining response accuracy becomes crucial. One of the primary methods for protecting sensitive information is data masking. However, this process can lead to significant information loss, potentially rendering responses from LLMs less accurate. How can this loss be measured?

Strengthen Anti-Money Laundering (AML) Compliance: Protegrity Empowers Financial Institutions

The “Russian Laundromat” scheme is a notorious example of how complex and far-reaching financial crimes can be. Running from 2010 to 2014, this scheme funneled between $20 billion and $80 billion out of Russia, using a network of shell companies and global banks, many of which were based in Moldova and Latvia. This was not a small operation — it involved around 500 people, many of whom were wealthy Russians, and relied on thousands of transactions to launder the money.

Web3 Security: Why It Matters and How Solana Keeps You Safe

So, you're diving into the world of Web3, huh? It's like the Wild West out there, with endless possibilities but also plenty of risks. Whether you're a seasoned pro or just getting started, one thing's for sure: security is a big deal. Let's talk about why Web3 security is essential and how Solana, one of the fastest-growing blockchains out there, is setting the standard.

A confident project unifies Bitcoin and Ethereum for interoperability purposes

Bitcoin and Ethereum have always been compared since they're two of the most popular cryptocurrencies on the market. Although they serve different purposes since Bitcoin is a store of value and Ethereum is used more as a way to access decentralized applications and environments, they've always had some similarities that investors contemplated upon.

Top tips: How you can build a robust cybersecurity mesh architecture

Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week, we’re going over five steps to building a robust cybersecurity mesh. The last few years have seen computing models and network infrastructure become increasingly fragmented and distributed.

Secure, Compliant, Privacy Preserving Analytics/RAG for Data Lakes

Discover how our intelligent data masking solution ensures secure, compliant, and privacy-preserving analytics for your data lakes. Protecto maintains data integrity while empowering your organization to leverage analytics or enable AI/RAG without compromising privacy or regulatory compliance.